Performing Post-Provisioning Tasks

This section shows you how to perform the post-provisioning tasks.

Prerequisite

Successfully completed the Deployment of a Quick Start or an Advanced Deployment Plan using the JD Edwards One-Click Provisioning Console.

Enabling Enterprise Server Predefined Ports

You must enable Predefined Ports in the jde.ini file on the Enterprise Server. Use Server Manager to ensure this setting exists:

[JDENET]

enablePredefinedPorts=1

For Release 9.2, the serviceNameListen value is 6017. The next port for use by net services on the Enterprise Server is defined by the value serviceNameListen+1 until the value set by maxNetProcesses= is reached, where the default is value is 6 net processes. Therefore, the default value of 6 net process means you must open ports in the firewall on the Enterprise Server 6018-6023 for use by net processes. These ports cannot be in use by any other process running on the Enterprise Server. If they are already in use, then whatever program is using them must be reconfigured to use different ports.

Starting the Database in the Secondary Node in RAC

If you are using DB Systems for your database, and if you have enabled RAC within it, if you have followed the recommendation in this Learning Path you have previously stopped the database in the Secondary Node in RAC. At this point you must start the database in the Secondary Node for RAC. The recommended procedure is to use a line command as shown below.

srvctl start instance -d <DB_UNIQUE_NAME> -i <DB_NAME>

where <DB_UNIQUE_NAME> is the name you determined in the preceding OBE in this Learning Path entitled: xxxx and in the section within that OBE entited: Setting Up the Secondary Node.

where <DB_NAME> is name you have given the database and which is appended with a 2. For example, if you gave the database name as ORCL, then the database name in the Secondary Node is named ORCL2.

Important: At this point both nodes of the RAC in DB Systems are running. Therefore, when transactions are submitted to the database by any JD Edwards EnterpriseOne server, the transaction can go to either node (Primary or Secondary). If for any reason either node goes down, the transactions from JD Edwards EnterpriseOne will be served by the node that is running. However, if the node that went down was the node in which the database connection failed while it was running a transaction, then there is lag of operation while the system switches the transactions to the node that is running. Further, if the Database is down on both nodes, and if in start up of the nodes there is delay of more than 75 seconds, then you must manually restart both the HTML Server and the Enterprise Server after the database is properly started.

To view details of the Secondary Node in RAC:

  1. On the Oracle Cloud Infrastructure Console Home page, click the Navigation Menu in the upper-left corner.
    navigation_menu
  2. From the Navigation Menu, in the Database section, click to select Bare Metal, VM, and Exadata.
  3. In the left panel ensure that DB Systems is selected, and that under List Scope that the applicable COMPARTMENT is selected which contains the DB System with RAC that you created.
  4. Click the link for your DB System with RAC.
  5. In the Resources section in the left pane, click Nodes.
    Details for two Nodes are displayed as shown below:
    nodes_detail

Setting up Additional Security Configurations

As part of meeting the CIS Benchmarks for secure Linux Machines, you can further secure your One-Click Provisioned Linux environments by performing the below steps:

These settings in the sshd_config file are located at /etc/ssh.

  • Disable TCP Forwarding

    Edit the /etc/ssh/sshd_config file to set the parameter as follows:

    AllowTcpForwarding=no

  • Disable Root Login

    Edit the /etc/ssh/sshd_config file to set the parameter as follows:

    PermitRootLogin=no

    Ensure that there are no other entries that might override the above settings. For the settings to reflect, restart the SSH Service using the below command:

    sudo systemctl restart sshd

Closing Port 22 on Public IP for Enhanced Security

For enhanced security, it is highly recommended to close Port 22 (SSH) in both the Security List (VCN/Subnet level) and the Network Security Group (NSG) after provisioning is complete. This minimizes potential vulnerabilities and aligns with a stronger security posture.

Follow the below steps to close Port 22 in Security List and NSG:

  • Security List:
    1. Navigate to the OCI Console > Networking > Virtual Cloud Networks (VCN)
    2. Select the VCN associated with your instance.
    3. Open the Security List attached to the subnet.
    4. Locate the ingress rule for Port 22 (TCP) and delete it.
  • Network Security Group (NSG):
    1. Navigate to the OCI Console > Networking > Network Security Groups
    2. Select the NSG attached to your instance.
    3. Locate the ingress rule allowing Port 22 (TCP) and delete it.